diff --git a/hosts/docker/configuration.nix b/hosts/docker/configuration.nix index e4f0452..91e81a3 100644 --- a/hosts/docker/configuration.nix +++ b/hosts/docker/configuration.nix @@ -149,7 +149,7 @@ systemd.timers.update-containers = { # Run as root so it can read /etc/secrets and access docker socket # User = "root"; #EnvironmentFile = "-/etc/secrets/docker-health-alert.env"; - ExecStart = "${pkgs.bash}/bin/bash /mnt/docker-persistent-data/docker/gotify/docker-health-to-gotify.sh"; + ExecStart = "${pkgs.bash}/bin/bash /mnt/docker-persistent-data/docker/monitoring/gotify/docker-health-to-gotify.sh"; StandardOutput = "journal"; StandardError = "journal"; }; diff --git a/modules/nix/cache-server.nix b/modules/nix/cache-server.nix index ae4d34c..466433a 100644 --- a/modules/nix/cache-server.nix +++ b/modules/nix/cache-server.nix @@ -38,7 +38,8 @@ # openssh.authorizedKeys.keys = [ "ssh-ed25519 AAAA... client@host" ]; # # Avoid absolute keyFiles paths here because they break pure flake evaluation. - openssh.authorizedKeys.keys = ["ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFDEA1S2ikpObREgbP5uVBWMxIOGbY8B+Wx7VTZK1m6t root@server" ]; + openssh.authorizedKeys.keys = ["ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFDEA1S2ikpObREgbP5uVBWMxIOGbY8B+Wx7VTZK1m6t root@server" + "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPAYIT9ormlmxZ0SziyDQaUntnKI8HK9/s3Qac1ZKjP2 root@docker" ]; }; services.openssh.enable = true;